Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    08/01/2024, 16:35

General

  • Target

    4becc52f8358fb2a4411317e9a0efdbe.exe

  • Size

    449KB

  • MD5

    4becc52f8358fb2a4411317e9a0efdbe

  • SHA1

    091d28ae896948d21490646dd7821cbe51f983fa

  • SHA256

    22d12dd7742af221edfb5956354819fd0904be765c1288bd5fa46a608019c48f

  • SHA512

    3debde2d8bcb7791ba2b8fa947dde31050b1bb9bdb4c8395616f967f49327f9a184c0efcd996b9d1f7c506243c610ae217dd0dd0f8cae51750d80f398c70609f

  • SSDEEP

    6144:TSelM67O+qiq2vZvymBvh62W4hPpmM7wyxGV6jQ6100nmK1r8iw49cCiKx:uIvZv7h62phxB7wyxGV6Z/4N49cCrx

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4becc52f8358fb2a4411317e9a0efdbe.exe
    "C:\Users\Admin\AppData\Local\Temp\4becc52f8358fb2a4411317e9a0efdbe.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\DM\installer.exe
      "C:\Users\Admin\AppData\Local\Temp\DM\installer.exe" /path="C:\Users\Admin\AppData\Local\Temp\4becc52f8358fb2a4411317e9a0efdbe.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\53STNJLW\px[1].js

    Filesize

    346B

    MD5

    f84f931c0dd37448e03f0dabf4e4ca9f

    SHA1

    9c2c50edcf576453ccc07bf65668bd23c76e8663

    SHA256

    5c1d5fd46a88611c31ecbb8ffc1142a7e74ec7fb7d72bd3891131c880ef3f584

    SHA512

    afc3089d932fb030e932bf6414ac05681771051dd51d164f09635ca09cbd8525a52879524b6aa24e972e7766ddf529484cc1ec416de8b61255435a89ba781f8c

  • C:\Users\Admin\AppData\Local\Temp\DM\parent.txt

    Filesize

    449KB

    MD5

    4becc52f8358fb2a4411317e9a0efdbe

    SHA1

    091d28ae896948d21490646dd7821cbe51f983fa

    SHA256

    22d12dd7742af221edfb5956354819fd0904be765c1288bd5fa46a608019c48f

    SHA512

    3debde2d8bcb7791ba2b8fa947dde31050b1bb9bdb4c8395616f967f49327f9a184c0efcd996b9d1f7c506243c610ae217dd0dd0f8cae51750d80f398c70609f

  • \Users\Admin\AppData\Local\Temp\DM\installer.exe

    Filesize

    5KB

    MD5

    a49a1a4d35ab32336d663198d886ac9e

    SHA1

    c066c32ef47f7f5c2ccdec882a1b3990cf5f19b8

    SHA256

    54bf47e5f09c0cc5ddbe0f2068952bf7931aed000dc4a48b588d8c538a9bea78

    SHA512

    224a35389bcfcce76809adcce71e45eb6f3d33d20a7ce02daad08a48345e74d06d4b116e5117ac4038bfbd1f0ee638c7331ab0a81b7b217f6eb0f43b1497d07d

  • memory/1124-11-0x00000000003A0000-0x0000000000420000-memory.dmp

    Filesize

    512KB

  • memory/1124-10-0x000007FEF5790000-0x000007FEF612D000-memory.dmp

    Filesize

    9.6MB

  • memory/1124-17-0x0000000020AF0000-0x0000000021296000-memory.dmp

    Filesize

    7.6MB

  • memory/1124-12-0x00000000003A0000-0x0000000000420000-memory.dmp

    Filesize

    512KB

  • memory/1124-8-0x000007FEF5790000-0x000007FEF612D000-memory.dmp

    Filesize

    9.6MB

  • memory/1124-27-0x000007FEF5790000-0x000007FEF612D000-memory.dmp

    Filesize

    9.6MB

  • memory/1124-13-0x00000000003A0000-0x0000000000420000-memory.dmp

    Filesize

    512KB

  • memory/1124-21-0x00000000003A0000-0x0000000000420000-memory.dmp

    Filesize

    512KB

  • memory/1124-9-0x00000000003A0000-0x0000000000420000-memory.dmp

    Filesize

    512KB

  • memory/1124-7-0x00000000005E0000-0x0000000000622000-memory.dmp

    Filesize

    264KB

  • memory/1124-38-0x00000000003A0000-0x0000000000420000-memory.dmp

    Filesize

    512KB

  • memory/1124-39-0x00000000003A0000-0x0000000000420000-memory.dmp

    Filesize

    512KB

  • memory/1124-40-0x00000000003A0000-0x0000000000420000-memory.dmp

    Filesize

    512KB